Jump to content

All Activity

This stream auto-updates     

  1. Past hour
  2. Yesterday
  3. Hi all This thread has been made so you can talk about everything Wowonder, pixelphoto, flame and playtube. Please note that there no sharing in this thread or it will be deleted. Kind regards
  4. Amigo, pode enviar para o e-mail: conectmidiatecnology@gmail.com
  5. Pls Send me the 5.1.1 Download Link too. Thank You Bros
  6. hi everybod its possible to upload new version? big thanks.
  7. i want to script InstaSocial (nulled) please!! https://codecanyon.net/item/instasocial-an-instagram-like-social-media-app-with-creative-filters-and-editing-tools/22493743?s_rank=1 does anyone have it? .... please share here
  8. please upload script nulled: https://codecanyon.net/item/whatsclone-advanced/22067012?s_rank=2 or script https://codecanyon.net/item/whatsclone-with-socket/17553421?s_rank=1 ( update 16/04/2018: ) . thanks
  9. Chaudhry Hamza

    Help About IOS Timeline App - Gift is 2.2 Nulled

    Hello @efezzers Join me on Facebook: https://fb.com/HamzaShafiqOfficial
  10. I've forgot to say. It's a Wowonder 1.8 Ios Timeline App.
  11. Hello, I've created my android timeline and messenger on my Macbook. When I try to build ios timeline app it gives error. But it's really a silly error. I can start my script on emulator with visual studio and xcode. But when I connect my iphone to my pc and try to build app into it I got an error. So I can't archive and share it my friends. Only work on the emulator. So I need really help with that error. If anyone can help me solve that error I'll send him Wowonder 2.2 DLL for any of website he has. See it's working on emulator : http://prntscr.com/l8iimc It's giving error when deploying iphone or package: http://prntscr.com/l8iiqw Thanks.
  12. Last week
  13. Anissa

    GET RETAIL Blesta v4.2.1 Retail by ADH

    share nulled version please
  14. Version 43.0


    phpSound is a Social Music Sharing Platform similar with SoundCloud, allowing users to upload their music online and share them with the world.


  15. Version 5.0


    Yoohoo is a real-time complete chatting app with groups and voice messages functionality. The user can send pictures, audio, video, contact detail, map location, voice messages, a user can create groups as well.


  16. victor

    chameleon social nulled

    chameleon social nulled current version
  17. I have FB Inboxer extended version 5.1.1 nulled. Those interested leave me a private message. Don't leave messages here please!
  18. INFO: ICO Token Media Provides a secure, Blockchain ICO development services to enable startup to do their project fundraising. Our ICO Website platform Includes all the features of a standard ICO website fully developed by our blockchain, fintech and security experts. We understand that accepting more cryptocurrencies is essential for any crowdfunding campaign. That’s why our ICO Website Script has an inbuilt deposit wallet which is flexible and supports Fiat, Wire bank transfers, Bitcoin, Ether, and 60 more coins. Our Investor cabinet and ICO Dashboard comes with an intuitive interface and powerful features which let you focus on marketing. Reward your participants with free tokens using our multi-level affiliate program. Ensure secure whitelist experience with free Integrated KYC solution. Customize your campaign, manage ICO stages add localizations, FAQs, and social networks to encourage your participants to invest in your campaign. With our intuitive Software, setting up and launching your own ICO takes no more than 10 minutes. That's even faster than a pizza at Dominos. VERSION: 1.0 DEMO LINK: https://icotokenmedia.com DOWNLOAD LINK: https://icotokenmedia.com
  19. This Raspberry Pi SSL certificate project will walk you through the steps to installing and setting up the Let’s Encrypt Certbot client on the Pi. This Certbot client allows the user to grab an SSL certificate from Let’s Encrypt by either utilizing your web server or by running its own temporary server. Let’s Encrypt is the best way to easily obtain a secure and certified SSL certificate for your Raspberry Pi completely free. Before you get started with setting up SSL on your Raspberry Pi, make sure that you have a domain name already set up and pointed at your IP address as an IP Address cannot have a certified SSL Certificate. If you are using Cloudflare as your DNS provider, then make sure you have it set to bypass Cloudflare as it hides your IP address meaning the Let’s Encrypt tool will fail to verify your Raspberry Pi’s IP address and generate it an SSL certificate. Equipment List Below are all the bits and pieces that I used for setting up Let’s Encrypt SSL on my Raspberry Pi, you will need an internet connection to be able to complete this tutorial. Recommended: Raspberry Pi 2 or 3 Micro SD Card Power Supply Ethernet Network Connection or Wifi dongle (The Pi 3 has WiFi inbuilt) Optional: Raspberry Pi Case Installing and Running Lets Encrypt 1. If you are running Raspbian Stretch or later you can skip down to step 5 of this tutorial as the package we will be utilizing to setup SSL on our Raspberry Pi is available in the Raspbian Stretch repository. However, if you are running Raspbian Jessie, you will have to follow the next four steps to install the SSL client Certbot on your Raspbian Jessie installation. That or you can upgrade from Raspbian Jessie to Stretch by following our easy guide and skipping to step five. Before we get installing the Let’s Encrypt Certbot software on Raspbian Jessie, we will first have to adjust our sources.list so that we can access the Jessie-Backports branch. We need to add this as Certbot is not available on Raspbian Jessie by default, be warned though as the backports repository contains software that isn’t as thoroughly tested. Begin editing the sources.list file by using the following command in the terminal. sudo nano /etc/apt/sources.list 2. To the bottom of this file, add the following line, this line tells Raspbian where to go searching for packages. deb http://ftp.debian.org/debian jessie-backports main Once done we can save & exit by pressing CTRL + X, then pressing Y and then pressing Enter. 3. Now since our public keys for the new packages are not available by default we will have to grab them and add them to the package manager, we can grab both public keys we need by typing in the following four commands. gpg --keyserver pgpkeys.mit.edu --recv-key 8B48AD6246925553 gpg -a --export 8B48AD6246925553 | sudo apt-key add - gpg --keyserver pgpkeys.mit.edu --recv-key 7638D0442B90D010 gpg -a --export 7638D0442B90D010 | sudo apt-key add - 4. With the package now added to our sources list, we will need to run an update to grab the latest package list. We can do that with the following command. sudo apt-get update 5. Now that you are up to installing the let’s encrypt software onto your Raspberry Pi you will either have to follow the instructions for Raspbian Jessie or Raspbian Stretch. Raspbian Stretch and Later Apache sudo apt-get install python-certbot-apache Everything Else sudo apt-get install certbot Raspbian Jessie Apache sudo apt-get install python-certbot-apache -t jessie-backports Everything Else sudo apt-get install certbot -t jessie-backports 6. With Certbot finally installed we can proceed with grabbing an SSL certificate for our Raspberry Pi from Let’s Encrypt. There is a couple of ways of handling this. If you are not using Apache, you can skip this step. If you are using Apache, then the easiest way of grabbing a certificate is by running the command shown below, this will automatically grab and install the certificate into Apache’s configuration. Before you do that, you will first have to make sure port 80 and port 443 are port forwarded. Also, if you are using Cloudflare as your DNS provider, you will need to temporarily bypass it as it hides your real IP address. certbot --apache 7. If you are not running Apache, there are two different ways we can go about grabbing a certificate from Let’s Encrypt. Thanks to the certbot software, we can either grab the server using a standalone python server. Alternatively, if you are running another web server such as NGINX, we can also utilize that to grab the certificate as well. Though you will have to set up the certificate manually once it has been grabbed. Go to step 8a if you are not running another web server, otherwise go to step 8b. 8a. Utilizing the standalone built-in web server is incredibly easy, though first, you will have to make sure your port 80 is unblocked and forwarded. Make sure you replace example.com with the domain name you intend on utilizing. certbot certonly --standalone -d example.com -d www.example.com 8b. Using web root requires a bit more knowledge then using the built-in web server. Make sure /var/www/example points to a working website directory that can be reached from the internet. Also, make sure to replace example.com with the domain name you are using for your website. certbot certonly --webroot -w /var/www/example -d example.com -d www.example.com 9. After running these commands, you will be prompted to enter some details, such as your email address. These details are required for Let’s Encrypt to keep track of the certificates it provides and also allow them to contact you if any issues arrive with the certificate. Once you have filled out the required information, it will proceed to grab the certificate from Let’s Encrypt. If you run into any issues make sure you have a valid domain name pointing at your IP, make sure port 80 and port 443 are unblocked, and finally, if you are using CloudFlare as your DNS provider, make sure that you have it currently set to bypass its servers. The certificates that are grabbed by the certbot client will be stored in the following folder. Of course, swapping out example.com with your own domain name. /etc/letsencrypt/live/example.com/ You will find both the full chain file (fullchain.pem) and the certificate’s private key file (privkey.pem) within these folders. Make sure you don’t allow others to access these files as they are what keep your SSL connection secure and identify it as a legitimate connection. With the files now successfully grabbed you can proceed to set up any piece of software you need to use them. For instance, if you wanted to setup NGINX to utilize the SSL certificates then follow our Raspberry Pi SSL Nginx guide below. Using your new SSL Certificate with NGINX 1. Begin by opening your NGINX configuration file. These are typically stored in /etc/nginx/ or /etc/nginx/sites-available/ Once you have found your configuration file, open it up using your favorite text editor, mine, for instance, is nano. Once you are within the file search for a text block like what is display below. Make sure you swap out our example.com with the domain name that you are using. server { listen 80 default_server; listen [::]:80 default_server; root /usr/share/nginx/html; index index.html index.htm; server_name example.com; location / { try_files $uri $uri/ =404; } } 2. To this block of code, we will need to make some changes. Follow our steps and read our explanations of why we are making the change below. Find listen [::]:80 default_server Add Below listen 443 ssl; This change tells NGINX to start listening on port 443. Port 443 is important as it is the port that handles HTTPS/SSL traffic and will be the port web browsers try to connect over when using https://. Find server_name example.com; Add Below ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem; This change tells NGINX where to find our certificate files. It will use these to set up the SSL/HTTPS connection. The private key is what secures the actual connection only your server can read and see this file, and this file should be kept secure otherwise people could potentially intercept and decrypt your traffic. The fullchain contains all the information needed to talk with the server over the HTTPS connection as well as the information needed to verify it is a legitimately signed SSL file. 3. With all those changes done, you should end up with something similar to what is displayed below. Of course, make sure you replaced example.com with your domain name. Once you are satisfied that you have entered the new data correctly, you can save and quit out of the file and then restart NGINX, so it loads in the new configuration. server { listen 80 default_server; listen [::]:80 default_server listen 443 ssl; root /usr/share/nginx/html; index index.html index.htm; server_name example.com; ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem; location / { try_files $uri $uri/ =404; } } 4. You should now have a fully operational HTTPS connection for your NGINX web server utilizing the certificate we generated with Let’s Encrypt. You should now hopefully have a fully validated SSL certificate that is provided to you from Let’s Encrypt. You will find this tutorial pretty handy across a wide range of projects, especially the server based Raspberry Pi projects. Hopefully, you have found this Raspberry Pi SSL tutorial helpful, if you have any issues or any feedback feel free to use the forum. Project from https://pimylifeup.com/raspberry-pi-ssl-lets-encrypt/
  20. THIS IS LAST VERSION: 4.3 its working 100% working with localhost, and live version have admin usre and password in sql DOWNLOAD:HER
  21. hi What does this warning mean in giveaways/ module? Oops! There was an error with the date format of End Date field
  22. hi What does this warning mean in giveaways/ module? Oops! There was an error with the date format of End Date field
  1. Load more activity


Important Information

By using this site, you agree to our Terms of Use and Guidelines.